Discord Used to Deliver Clipboard Hijacker Targeting Cryptocurrency Wallets

Related

ApolloMD Data Breach Impacts More Than 620,000

What happened A cyberattack on the Georgia-based healthcare provider ApolloMD...

Atlas Air Ransomware Breach Allegedly Exposes Boeing Technical Data

What happened Attackers claiming affiliation with the Everest ransomware gang...

Threat Actors Leveraging Employee Monitoring and SimpleHelp Tools in Attacks

What happened Security researchers have documented threat actors abusing legitimate...

Palo Alto Networks Firewall Reboot Loop Flaw Affects Next-Generation Devices

What happened A software flaw in Palo Alto Networks next-generation...

Promptware Leveraged Google Calendar Invites in Credential Harvesting Campaign

What happened Security researchers from ReversingLabs have uncovered a malicious...

Share

What happened

Attackers are abusing Discord to deliver a clipboard hijacker that intercepts cryptocurrency wallet addresses. The malware, delivered via Discord channels and direct messages, replaces copied wallet addresses with attacker-controlled addresses. Researchers from CloudSEK analyzed the attack, noting that it exploits users’ clipboard operations to steal crypto assets during routine transactions. The campaign employs lightweight loaders, obfuscation, and social engineering to trick users into executing the payload. Once installed, the malware monitors clipboard content continuously, redirecting funds without user awareness.

Who is affected

Cryptocurrency users operating on Discord, including individuals and communities exchanging wallet addresses, face direct exposure to fund theft.

Why CISOs should care

This malware demonstrates how social platforms can be leveraged to compromise financial assets, introducing both operational and reputational risk for organizations or users handling cryptocurrency.

3 practical actions

  • Educate users on social engineering: Warn users about malicious links and executable files distributed via messaging platforms.
  • Monitor clipboard and transaction activity: Implement detection for unusual wallet address substitutions.
  • Restrict execution of unverified software: Apply application control to prevent unauthorized binaries from running.